- - --------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200304-07 - - --------------------------------------------------------------------- PACKAGE : monkeyd SUMMARY : DATE : 2003-04-28 08:43 UTC EXPLOIT : remote VERSIONS AFFECTED :=snort-0.6.2 CVE : - - --------------------------------------------------------------------- - From advisory: "A buffer overflow vulnerability exists in Monkey's handling of forms submitted with the POST request method. The unchecked buffer lies in the PostMethod() procedure." Read the full advisory at: https://marc.theaimsgroup.com/?l=bugtraq&m=105094204204166&w=2 SOLUTION It is recommended that all Gentoo Linux users who are running net-www/monkeyd upgrade to monkeyd-0.6.3 as follows: emerge sync emerge monkeyd emerge clean